IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spamming

RSS Feed    Add to Google    Add to My Yahoo!
Spamming White Papers (View All Report Types)
 
Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Why You Should Consider Hosted Messaging Security
sponsored by Trend Micro GmbH
WHITE PAPER: In a major study of the hosted services market conducted by Osterman Research in 2008, antispam and virus protection were the two hosted offerings that organizations identified as services that they will likely or definitely deploy to supplement internally managed infrastructure. Read this paper to learn more.
Posted: 25 Sep 2009 | Published: 19 Feb 2009

Trend Micro GmbH

IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER: In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013

IBM

Protecting the Windows Environment: A Blueprint for Small and Mid-sized Organizations
sponsored by Symantec Corporation
WHITE PAPER: Many companies rely on a Microsoft® Windows® environment. But many fail to recognize the vulnerabilities in Windows based systems. Explore the challenges and learn about a strategy for mitigating risk without adding cost and complexity.
Posted: 25 Oct 2006 | Published: 01 Oct 2006

Symantec Corporation

Symantec Intelligence Report - August 2013
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
Posted: 21 Oct 2013 | Published: 31 Aug 2013

Symantec Corporation

The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett Packard Enterprise

What is FakeAV?
sponsored by Sophos UK
WHITE PAPER: Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Sophos UK
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement